CVE-2022-35202

5.1 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to download the Java keystore containing SAML signing private keys via WebDAV in non-default configurations. Attackers can then forge SAML authentication requests, potentially compromising federated identity systems. Organizations using Sitevision 10.3.1 or older with WebDAV enabled and SAML configured are affected.

💻 Affected Systems

Products:
  • Sitevision
Versions: 10.3.1 and older
Operating Systems: All platforms running Sitevision
Default Config Vulnerable: ✅ No
Notes: Requires WebDAV enabled and SAML configured - both are non-default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SAML-based authentication allowing attackers to impersonate any user, access all federated applications, and potentially pivot to other systems.

🟠

Likely Case

Attackers gain unauthorized access to federated applications by forging SAML assertions, leading to data breaches and privilege escalation.

🟢

If Mitigated

Limited impact if WebDAV is disabled, keystore is properly protected, or SAML is not implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed exploitation methodology published in research blog. Attack involves WebDAV access to download keystore with weak auto-generated password.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Sitevision 10.3.2

Vendor Advisory: https://developer.sitevision.se/archives/release-notes/release-notes/2022-05-06-release-notes-sitevision-10.3

Restart Required: Yes

Instructions:

1. Download Sitevision 10.3.2 or newer from official vendor. 2. Backup current installation. 3. Apply update following vendor documentation. 4. Restart Sitevision services. 5. Verify keystore is no longer accessible via WebDAV.

🔧 Temporary Workarounds

Disable WebDAV

all

Disable WebDAV functionality to prevent keystore download.

Modify Sitevision configuration to disable WebDAV module

Restrict WebDAV Access

all

Implement IP-based restrictions or authentication for WebDAV endpoints.

Configure web server (Apache/Nginx) to restrict access to /webdav/* paths

🧯 If You Can't Patch

  • Disable WebDAV functionality immediately
  • Implement network segmentation to restrict access to Sitevision servers

🔍 How to Verify

Check if Vulnerable:

Check if WebDAV is enabled and accessible at /webdav/keystore.jks path. Attempt to download the keystore file.

Check Version:

Check Sitevision administration panel or version file in installation directory

Verify Fix Applied:

Verify Sitevision version is 10.3.2 or newer and confirm keystore.jks is no longer accessible via WebDAV.

📡 Detection & Monitoring

Log Indicators:

  • WebDAV access logs showing keystore.jks downloads
  • Failed authentication attempts to SAML endpoints
  • Unusual SAML assertion patterns

Network Indicators:

  • HTTP GET requests to /webdav/keystore.jks
  • Unusual SAML traffic from unexpected sources

SIEM Query:

source="webdav_logs" AND (uri="/webdav/keystore.jks" OR filename="keystore.jks")

🔗 References

📤 Share & Export